General

  • Target

    1384-989-0x0000000000400000-0x000000000040F000-memory.dmp

  • Size

    60KB

  • MD5

    5c05a2cd05caa2ee3d6af08da3ce5e7c

  • SHA1

    4c2ebb5e1eb347c9ce45662924be65e782e63218

  • SHA256

    a9dddd514c4c8c9184fc84389755712dbd284401655fa0c81a394836a4082f48

  • SHA512

    97450e2addf5408abc7fe5dac641f839ae1cc0464c1826fe4f9cb9d1fc53d92508e1bf0704ce4ad77cec4484d797af6612a464385609a3ea920e58603e1363f1

  • SSDEEP

    768:TVcCo1dt4cybqx7P9vm9Rg6+E7apmW4Kmsk:T2t4cybq56O4K4

Malware Config

Extracted

Family

raccoon

Botnet

071a7b18a42c1cd94de2fc5bb0bbcaf2

C2

http://85.209.134.122:80/

Attributes
  • user_agent

    DuckTales

xor.plain

Signatures

  • Raccoon Stealer V2 payload 1 IoCs
  • Raccoon family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1384-989-0x0000000000400000-0x000000000040F000-memory.dmp
    .exe windows:6 windows x86 arch:x86


    Headers

    Sections